An efficient mCK signing and mobile based identity solution for authentication
With the growing spread of mobile devices, many services are accessed using such devices
and hence there is a need to have an authentication mechanism for mobile-based …
and hence there is a need to have an authentication mechanism for mobile-based …
Design and formal analysis of a lightweight MIPv6 authentication scheme
The emergence of mobile IPv6 (MIPv6) significantly affected how we live and work, while it
still faces more security threats than traditional wireless networks. On the other hand, most …
still faces more security threats than traditional wireless networks. On the other hand, most …
Secure Mobile ID Architecture on Android Devices based on Trust Zone
Owing to their mobility, persistent connectivity, and variety of applications, cell phones are
now more often used as a primary computing platform than desktop computers and laptops …
now more often used as a primary computing platform than desktop computers and laptops …
Comparative Analysis of Various Elliptic Curve Cryptography Algorithms for Handheld Devices
Today, all functions like purchases, banking, payments, social media, games, etc. are
carried out using mobile phones. While performing these functionalities data transmission …
carried out using mobile phones. While performing these functionalities data transmission …
A secure and efficient mobile ID framework for authentication with enhanced ECC
The broad adoption of smartphones as a primary computing platform has led to their use for
several real-life applications. Online payment transactions, location-based services …
several real-life applications. Online payment transactions, location-based services …
Research Challenges in IoT enablement for Enterprise
K Bhatia, SK Pandey, VK Singh… - 2023 10th International …, 2023 - ieeexplore.ieee.org
Although Internet of Things (IoT) is not a new terminology yet finding its suitability to many of
the enterprises is challenging. Because almost all the applications are dynamic in nature …
the enterprises is challenging. Because almost all the applications are dynamic in nature …
A Framework for Identity Management on Mobile Devices for mGovernance Application
In the past decade, mobile computing has spurred the development of diverse user-centric
applications, enhancing the capabilities of service providers and government entities …
applications, enhancing the capabilities of service providers and government entities …